Conferences related to Computer viruses

Back to Top

2011 3rd International Workshop on Education Technology and Computer Science (ETCS)

ETCS2011 will be held on 12-13 March, 2011 in Wuhan, China. ETCS2009 and ETCS2010 have been indexed by EI Compendex and ISTP. The ETCS2011 will bring together the top researchers from Asian Pacific nations, North America, Europe and around the world to exchange their research results and address open issues in Education Technology and Computer Science.

  • 2010 2nd International Workshop on Education Technology and Computer Science (ETCS)

    The 2nd International Workshop on Education Technology and Computer Science (ETCS2010) will be held on 6-7 March, 2010 in Wuhan, China. The workshop will bring together the top researchers from Asian Pacific nations, North America, Europe and around the world to exchange their research results and address open issues in Education Technology and Computer Science.

  • 2009 First International Workshop on Education Technology and Computer Science (ETCS)

    ETCS2009 is organized by Huazhong Universiy of Science and Technology, Harbin Institute of Technology,and supported by IEEE Harbin Section, Huazhong Normal University,Wuhan University. ETCS 2009 will be convened in the magnificent cultural city - Wuhan, China. ETCS 2009 will bring experts from several continents to give presentations, exchange information and learn about the latest developments in the field of education and computer science.


2010 Second International Conference on Computational Intelligence and Natural Computing (CINC)

The CINC 2010 conference provides a forum for engineers and scientists in academia, industry, and government to address profound issues including technical challenges, safety, social, legal, political, and economic issues, and to present and discuss their ideas, results, work in progress and experience on all aspects of computational intelligence and natural computing.


2009 Fourth International Conference on Software Engineering Advances (ICSEA)

The International Conference on Software Engineering Advances (ICSEA 2009) continues a series of events covering a broad spectrum of software-related topics. The conference covers fundamentals on designing, implementing, testing, validating and maintaining various kinds of software. Several tracks are proposed to treat the topics from theory to practice, in terms of methodologies, design, implementation, testing, use cases, tools, and lessons learned.


2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2008)

The First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2008) is a forum for scientists, engineers, and practitioners to present their latest research results, ideas, developments and applications in all areas of Computer and Information Sciences, Artificial Intelligence, Mobile Computing, Networking, Web Content Mining, Health Informatics, Bioinformatics and IT Applications across disciplines. The First International Conference on the Applications of



Periodicals related to Computer viruses

Back to Top

Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


Information Theory, IEEE Transactions on

The fundamental nature of the communication process; storage, transmission and utilization of information; coding and decoding of digital and analog communication transmissions; study of random interference and information-bearing signals; and the development of information-theoretic techniques in diverse areas, including data communication and recording systems, communication networks, cryptography, detection systems, pattern recognition, learning, and automata.


Micro, IEEE

IEEE Micro magazine presents high-quality technical articles from designers, systems integrators, and users discussing the design, performance, or application of microcomputer and microprocessor systems. Topics include architecture, components, subassemblies, operating systems, application software, communications, fault tolerance, instrumentation, control equipment, and peripherals.


Systems, Man, and Cybernetics, Part B, IEEE Transactions on

The scope of the IEEE Transactions on Systems, Man and Cybernetics Part B: Cybernetics includes computational approaches to the field of cybernetics. Specifically, the transactions welcomes papers on communication and control across machines or between machines, humans, and organizations. The scope of Part B includes such areas as computational intelligence, computer vision, neural networks, genetic algorithms, machine learning, fuzzy systems, ...




Xplore Articles related to Computer viruses

Back to Top

The Dark Side of Computing: SRI International and the Study of Computer Crime

Donn B. Parker IEEE Annals of the History of Computing, 2007

From the perspective of an information security researcher and consultant who studied crime for 40 years, this brief history of computer crime delves into study methods and presents findings from many years of National Science Foundation and US department of justice grant-supported research and business support at SRI International


Hardware Support for Efficient Data Classification

Jakub Botwicz; Piotr Buciak EUROCON 2007 - The International Conference on "Computer as a Tool", 2007

This document describes a group of data classification problems and presents novel architecture of hardware support for data processing using hardware- software co-synthesis. The presented exemplar solution is a content-based file classifier that uses less then 1% of resources of chips currently available at the market and can provide throughput of over 2 Gbps.


A new network immunization strategy better than High Degree First

Changxi Niu; Lemin Li; Du Xu 2009 IEEE International Conference on Communications Technology and Applications, 2009

Epidemic attacks like worms and viruses are serious problems in Internet today. Designing effective network immunization strategy is an important way to defend against them. High Degree First (HDF) immunization strategy is the most effective strategy so far. In this paper, we propose a new network immunization strategy based on graph partitioning method. The strategy aims at partitioning the network ...


AI trends in virus control

I. Qasem; H. Yaghi Southeastcon '91., IEEE Proceedings of, 1991

It is suggested that modern forms of programming techniques through the use of artificial intelligence (AI) can be used in the fight against computer viruses. Through the use of AI programming techniques, systems will be capable of dynamically representing human expertise through investigating, analyzing, and simulating human problem-solving behavior


Analyzing Self-Defense Investments in Internet Security under Cyber-Insurance Coverage

Ranjan Pal; Leana Golubchik 2010 IEEE 30th International Conference on Distributed Computing Systems, 2010

Internet users such as individuals and organizations are subject to different types of epidemic risks such as worms, viruses, and botnets. To reduce the probability of risk, an Internet user generally invests in self-defense mechanisms like antivirus and antispam software. However, such software does not completely eliminate risk. Recent works have considered the problem of residual risk elimination by proposing ...


More Xplore Articles

Educational Resources on Computer viruses

Back to Top

eLearning

The Dark Side of Computing: SRI International and the Study of Computer Crime

Donn B. Parker IEEE Annals of the History of Computing, 2007

From the perspective of an information security researcher and consultant who studied crime for 40 years, this brief history of computer crime delves into study methods and presents findings from many years of National Science Foundation and US department of justice grant-supported research and business support at SRI International


Hardware Support for Efficient Data Classification

Jakub Botwicz; Piotr Buciak EUROCON 2007 - The International Conference on "Computer as a Tool", 2007

This document describes a group of data classification problems and presents novel architecture of hardware support for data processing using hardware- software co-synthesis. The presented exemplar solution is a content-based file classifier that uses less then 1% of resources of chips currently available at the market and can provide throughput of over 2 Gbps.


A new network immunization strategy better than High Degree First

Changxi Niu; Lemin Li; Du Xu 2009 IEEE International Conference on Communications Technology and Applications, 2009

Epidemic attacks like worms and viruses are serious problems in Internet today. Designing effective network immunization strategy is an important way to defend against them. High Degree First (HDF) immunization strategy is the most effective strategy so far. In this paper, we propose a new network immunization strategy based on graph partitioning method. The strategy aims at partitioning the network ...


AI trends in virus control

I. Qasem; H. Yaghi Southeastcon '91., IEEE Proceedings of, 1991

It is suggested that modern forms of programming techniques through the use of artificial intelligence (AI) can be used in the fight against computer viruses. Through the use of AI programming techniques, systems will be capable of dynamically representing human expertise through investigating, analyzing, and simulating human problem-solving behavior


Analyzing Self-Defense Investments in Internet Security under Cyber-Insurance Coverage

Ranjan Pal; Leana Golubchik 2010 IEEE 30th International Conference on Distributed Computing Systems, 2010

Internet users such as individuals and organizations are subject to different types of epidemic risks such as worms, viruses, and botnets. To reduce the probability of risk, an Internet user generally invests in self-defense mechanisms like antivirus and antispam software. However, such software does not completely eliminate risk. Recent works have considered the problem of residual risk elimination by proposing ...


More eLearning Resources

IEEE-USA E-Books

  • Appendix B: Codes of Ethics

    All you have to do is watch the news, or be warned not to open your email today, to recognize the necessity for this revised and enhanced edition of this critical work, first published in 1995. We are inundated daily with intellectual property issues and warnings against computer viruses and hackers. Government and law enforcement agency involvement in the security of our computer systems leaves us vulnerable to abuse of privacy, and raises the specter of "Big Brother". Also, many critical systems controlled by computers, such as nuclear power facilities and missile defense systems, are often designed and tested with an over-reliance on computer modeling, which can cause failure, injury or loss of life. _Ethics and Computing, Second Edition_ promotes awareness of these and other major issues and accepted procedures and policies in the area of ethics and computing, using real-world companies, incidents, products and people. An entire chapter is dedicated to detailed analysis o the major ethical codes relevant to computing professionals: The Association of Information Technology Professionals (AITP) code of ethics, IEEE (Institute of Electrical and Electronics Engineers) code of ethics, the Association of Computing Machinery codes of ethics, and the ACM/IEEE Software Engineering code of ethics. _Ethics and Computing, Second Edition_ is ideally suited for topical undergraduate courses with chapters and assignments designed to encourage critical thinking and informed ethical decisions. Furthermore, this invaluable book will keep abreast computer science, computer engineering, and information systems professionals and their colleagues of current ethical issues and responsibilities.

  • Computer Viruses as Artificial Life

    There has been considerable interest in computer viruses since they first appeared in 1981, and especially in the past few years as they have reached epidemic numbers in many personal computer environments. Viruses have been written about as a security problem, as a social problem, and as a possible means of performing useful tasks in a distributed computing environment. However, only recently have some scientists begun to ask if computer viruses are not a form of artificial life--a self-replicating organism. Simply because computer viruses do not exist as organic molecules may not be sufficient reason to dismiss the classification of this form of "vandalware" as a form of life. This paper begins with a description of how computer viruses operate and their history, and of the various ways computer viruses are structured. It then examines how viruses meet properties associated with life as defined by some researchers in the area of artificial life and self-organizing systems. The paper concludes with some comments directed toward the definition of artificially "alive" systems and experimentation.

  • Appendix C: Pointers to Additional Resources

    All you have to do is watch the news, or be warned not to open your email today, to recognize the necessity for this revised and enhanced edition of this critical work, first published in 1995. We are inundated daily with intellectual property issues and warnings against computer viruses and hackers. Government and law enforcement agency involvement in the security of our computer systems leaves us vulnerable to abuse of privacy, and raises the specter of "Big Brother". Also, many critical systems controlled by computers, such as nuclear power facilities and missile defense systems, are often designed and tested with an over-reliance on computer modeling, which can cause failure, injury or loss of life. _Ethics and Computing, Second Edition_ promotes awareness of these and other major issues and accepted procedures and policies in the area of ethics and computing, using real-world companies, incidents, products and people. An entire chapter is dedicated to detailed analysis o the major ethical codes relevant to computing professionals: The Association of Information Technology Professionals (AITP) code of ethics, IEEE (Institute of Electrical and Electronics Engineers) code of ethics, the Association of Computing Machinery codes of ethics, and the ACM/IEEE Software Engineering code of ethics. _Ethics and Computing, Second Edition_ is ideally suited for topical undergraduate courses with chapters and assignments designed to encourage critical thinking and informed ethical decisions. Furthermore, this invaluable book will keep abreast computer science, computer engineering, and information systems professionals and their colleagues of current ethical issues and responsibilities.

  • About the Editor

    All you have to do is watch the news, or be warned not to open your email today, to recognize the necessity for this revised and enhanced edition of this critical work, first published in 1995. We are inundated daily with intellectual property issues and warnings against computer viruses and hackers. Government and law enforcement agency involvement in the security of our computer systems leaves us vulnerable to abuse of privacy, and raises the specter of "Big Brother". Also, many critical systems controlled by computers, such as nuclear power facilities and missile defense systems, are often designed and tested with an over-reliance on computer modeling, which can cause failure, injury or loss of life. _Ethics and Computing, Second Edition_ promotes awareness of these and other major issues and accepted procedures and policies in the area of ethics and computing, using real-world companies, incidents, products and people. An entire chapter is dedicated to detailed analysis o the major ethical codes relevant to computing professionals: The Association of Information Technology Professionals (AITP) code of ethics, IEEE (Institute of Electrical and Electronics Engineers) code of ethics, the Association of Computing Machinery codes of ethics, and the ACM/IEEE Software Engineering code of ethics. _Ethics and Computing, Second Edition_ is ideally suited for topical undergraduate courses with chapters and assignments designed to encourage critical thinking and informed ethical decisions. Furthermore, this invaluable book will keep abreast computer science, computer engineering, and information systems professionals and their colleagues of current ethical issues and responsibilities.

  • Index

    All you have to do is watch the news, or be warned not to open your email today, to recognize the necessity for this revised and enhanced edition of this critical work, first published in 1995. We are inundated daily with intellectual property issues and warnings against computer viruses and hackers. Government and law enforcement agency involvement in the security of our computer systems leaves us vulnerable to abuse of privacy, and raises the specter of "Big Brother". Also, many critical systems controlled by computers, such as nuclear power facilities and missile defense systems, are often designed and tested with an over-reliance on computer modeling, which can cause failure, injury or loss of life. _Ethics and Computing, Second Edition_ promotes awareness of these and other major issues and accepted procedures and policies in the area of ethics and computing, using real-world companies, incidents, products and people. An entire chapter is dedicated to detailed analysis o the major ethical codes relevant to computing professionals: The Association of Information Technology Professionals (AITP) code of ethics, IEEE (Institute of Electrical and Electronics Engineers) code of ethics, the Association of Computing Machinery codes of ethics, and the ACM/IEEE Software Engineering code of ethics. _Ethics and Computing, Second Edition_ is ideally suited for topical undergraduate courses with chapters and assignments designed to encourage critical thinking and informed ethical decisions. Furthermore, this invaluable book will keep abreast computer science, computer engineering, and information systems professionals and their colleagues of current ethical issues and responsibilities.



Standards related to Computer viruses

Back to Top

No standards are currently tagged "Computer viruses"


Jobs related to Computer viruses

Back to Top